var-201702-0071
Vulnerability from variot
An issue was discovered in Moxa OnCell OnCellG3470A-LTE, AWK-1131A/3131A/4131A Series, AWK-3191 Series, AWK-5232/6232 Series, AWK-1121/1127 Series, WAC-1001 V2 Series, WAC-2004 Series, AWK-3121-M12-RTG Series, AWK-3131-M12-RCC Series, AWK-5232-M12-RCC Series, TAP-6226 Series, AWK-3121/4121 Series, AWK-3131/4131 Series, and AWK-5222/6222 Series. Any user is able to download log files by accessing a specific URL. MOXAOnCell is an industrial grade IP gateway product. The MoxaOnCellSeries product verification bypass vulnerability allows an attacker to bypass the authentication mechanism and gain unauthorized access. Moxa OnCell Series products are prone to an authentication-bypass vulnerability and an OS command execution vulnerability. Moxa OnCellG3470A-LTE etc
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201702-0071",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "oncellg3470a-lte",
"scope": null,
"trust": 1.4,
"vendor": "moxa",
"version": null
},
{
"model": "awk-1127",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "06-29-2017"
},
{
"model": "awk-5232",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "05-30-2017"
},
{
"model": "wac-1001 v2",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "06-29-2017"
},
{
"model": "wac-2004",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "06-29-2017"
},
{
"model": "awk-6232",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "05-30-2017"
},
{
"model": "awk-5232-m12-rcc",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "06-29-2017"
},
{
"model": "awk-1131a",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "10-31-2016"
},
{
"model": "oncellg3470a-lte",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "10-31-2016"
},
{
"model": "awk-3131-m12-rcc",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "06-29-2017"
},
{
"model": "awk-3191",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "05-30-2017"
},
{
"model": "awk-3121-m12-rtg",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "06-29-2017"
},
{
"model": "awk-1121",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "06-29-2017"
},
{
"model": "awk-3131a",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "10-31-2016"
},
{
"model": "awk-4131a",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "10-31-2016"
},
{
"model": "awk-1121",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "awk-1127",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "awk-1131a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "awk-3121-m12-rtg",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "awk-3131-m12-rcc",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "awk-3131a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "awk-3191",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "awk-4131a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "awk-5232",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "awk-5232-m12-rcc",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "awk-6232",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "wac-1001 v2",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "wac-2004",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "awk-5222/6222 series",
"scope": null,
"trust": 0.6,
"vendor": "moxa",
"version": null
},
{
"model": "awk-3131/4131 series",
"scope": null,
"trust": 0.6,
"vendor": "moxa",
"version": null
},
{
"model": "awk-3121/4121 series",
"scope": null,
"trust": 0.6,
"vendor": "moxa",
"version": null
},
{
"model": "tap-6226 series",
"scope": null,
"trust": 0.6,
"vendor": "moxa",
"version": null
},
{
"model": "awk-5232-m12-rcc series",
"scope": null,
"trust": 0.6,
"vendor": "moxa",
"version": null
},
{
"model": "awk-3131-m12-rcc series",
"scope": null,
"trust": 0.6,
"vendor": "moxa",
"version": null
},
{
"model": "awk-3121-m12-rtg series",
"scope": null,
"trust": 0.6,
"vendor": "moxa",
"version": null
},
{
"model": "wac-2004 series",
"scope": null,
"trust": 0.6,
"vendor": "moxa",
"version": null
},
{
"model": "wac-1001 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "v2"
},
{
"model": "awk-1121/1127 series",
"scope": null,
"trust": 0.6,
"vendor": "moxa",
"version": null
},
{
"model": "awk-5232/6232 series",
"scope": null,
"trust": 0.6,
"vendor": "moxa",
"version": null
},
{
"model": "awk-3191 series",
"scope": null,
"trust": 0.6,
"vendor": "moxa",
"version": null
},
{
"model": "awk-1131a/3131a/4131a series",
"scope": null,
"trust": 0.6,
"vendor": "moxa",
"version": null
},
{
"model": "awk-1131a",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "10-31-2016"
},
{
"model": "awk-6232",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "05-30-2017"
},
{
"model": "oncellg3470a-lte",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "10-31-2016"
},
{
"model": "awk-5232",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "05-30-2017"
},
{
"model": "awk-5232-m12-rcc",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "06-29-2017"
},
{
"model": "awk-4131a",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "10-31-2016"
},
{
"model": "awk-3131a",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "10-31-2016"
},
{
"model": "awk-1121",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "06-29-2017"
},
{
"model": "awk-3131-m12-rcc",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "06-29-2017"
},
{
"model": "awk-3191",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "05-30-2017"
},
{
"model": "wac-2004",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "wac-1001",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "v20"
},
{
"model": "tap-6226",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "oncellg3470a-lte",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "awk-6232",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "awk-6222",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "awk-5232-m12-rcc",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "awk-5232",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "awk-5222",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "awk-4131a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "awk-4131",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "awk-4121",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "awk-3191",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "awk-3131a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "awk-3131-m12-rcc",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "awk-3131",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "awk-3121-m12-rtg",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "awk-3121",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "awk-1131a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "awk-1127",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "awk-1121",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-10731"
},
{
"db": "BID",
"id": "94092"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007996"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-108"
},
{
"db": "NVD",
"id": "CVE-2016-8362"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:moxa:awk-1121_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:awk-1127_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:awk-1131a_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:awk-3121-m12-rtg_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:awk-3131-m12-rcc_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:awk-3131a_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:awk-3191_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:awk-4131a_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:awk-5232_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:awk-5232-m12-rcc_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:awk-6232_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:oncellg3470a-lte_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:wac-1001_v2_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:wac-2004_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-007996"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Maxim Rupp",
"sources": [
{
"db": "BID",
"id": "94092"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-108"
}
],
"trust": 0.9
},
"cve": "CVE-2016-8362",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CVE-2016-8362",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 4.9,
"id": "CNVD-2016-10731",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:H/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-97182",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2016-8362",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-8362",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2016-8362",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2016-10731",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201611-108",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-97182",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2016-8362",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-10731"
},
{
"db": "VULHUB",
"id": "VHN-97182"
},
{
"db": "VULMON",
"id": "CVE-2016-8362"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007996"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-108"
},
{
"db": "NVD",
"id": "CVE-2016-8362"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue was discovered in Moxa OnCell OnCellG3470A-LTE, AWK-1131A/3131A/4131A Series, AWK-3191 Series, AWK-5232/6232 Series, AWK-1121/1127 Series, WAC-1001 V2 Series, WAC-2004 Series, AWK-3121-M12-RTG Series, AWK-3131-M12-RCC Series, AWK-5232-M12-RCC Series, TAP-6226 Series, AWK-3121/4121 Series, AWK-3131/4131 Series, and AWK-5222/6222 Series. Any user is able to download log files by accessing a specific URL. MOXAOnCell is an industrial grade IP gateway product. The MoxaOnCellSeries product verification bypass vulnerability allows an attacker to bypass the authentication mechanism and gain unauthorized access. Moxa OnCell Series products are prone to an authentication-bypass vulnerability and an OS command execution vulnerability. Moxa OnCellG3470A-LTE etc",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-8362"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007996"
},
{
"db": "CNVD",
"id": "CNVD-2016-10731"
},
{
"db": "BID",
"id": "94092"
},
{
"db": "VULHUB",
"id": "VHN-97182"
},
{
"db": "VULMON",
"id": "CVE-2016-8362"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-8362",
"trust": 3.5
},
{
"db": "ICS CERT",
"id": "ICSA-16-308-01",
"trust": 2.9
},
{
"db": "BID",
"id": "94092",
"trust": 2.7
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007996",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201611-108",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-10731",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-97182",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2016-8362",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-10731"
},
{
"db": "VULHUB",
"id": "VHN-97182"
},
{
"db": "VULMON",
"id": "CVE-2016-8362"
},
{
"db": "BID",
"id": "94092"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007996"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-108"
},
{
"db": "NVD",
"id": "CVE-2016-8362"
}
]
},
"id": "VAR-201702-0071",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-10731"
},
{
"db": "VULHUB",
"id": "VHN-97182"
}
],
"trust": 1.62773228375
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-10731"
}
]
},
"last_update_date": "2024-11-23T22:30:51.575000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.moxa.com/"
},
{
"title": "MoxaOnCellSeries product verification patch to bypass vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/83636"
},
{
"title": "Moxa OnCell Series product authentication bypass vulnerability fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65334"
},
{
"title": "Moxa OnCell Series product authentication bypass vulnerability fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65481"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-10731"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007996"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-108"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-97182"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007996"
},
{
"db": "NVD",
"id": "CVE-2016-8362"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.0,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-308-01"
},
{
"trust": 2.4,
"url": "http://www.securityfocus.com/bid/94092"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8362"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-8362"
},
{
"trust": 0.3,
"url": "http://www.moxa.com/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/287.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-10731"
},
{
"db": "VULHUB",
"id": "VHN-97182"
},
{
"db": "VULMON",
"id": "CVE-2016-8362"
},
{
"db": "BID",
"id": "94092"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007996"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-108"
},
{
"db": "NVD",
"id": "CVE-2016-8362"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-10731"
},
{
"db": "VULHUB",
"id": "VHN-97182"
},
{
"db": "VULMON",
"id": "CVE-2016-8362"
},
{
"db": "BID",
"id": "94092"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007996"
},
{
"db": "CNNVD",
"id": "CNNVD-201611-108"
},
{
"db": "NVD",
"id": "CVE-2016-8362"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-11-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-10731"
},
{
"date": "2017-02-13T00:00:00",
"db": "VULHUB",
"id": "VHN-97182"
},
{
"date": "2017-02-13T00:00:00",
"db": "VULMON",
"id": "CVE-2016-8362"
},
{
"date": "2016-11-03T00:00:00",
"db": "BID",
"id": "94092"
},
{
"date": "2017-04-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007996"
},
{
"date": "2016-11-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201611-108"
},
{
"date": "2017-02-13T21:59:01.050000",
"db": "NVD",
"id": "CVE-2016-8362"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-11-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-10731"
},
{
"date": "2017-03-16T00:00:00",
"db": "VULHUB",
"id": "VHN-97182"
},
{
"date": "2017-03-16T00:00:00",
"db": "VULMON",
"id": "CVE-2016-8362"
},
{
"date": "2016-11-24T01:07:00",
"db": "BID",
"id": "94092"
},
{
"date": "2017-04-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007996"
},
{
"date": "2016-11-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201611-108"
},
{
"date": "2024-11-21T02:59:13.450000",
"db": "NVD",
"id": "CVE-2016-8362"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201611-108"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Moxa OnCell Vulnerability in downloading log files in series products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-007996"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201611-108"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.